Sciweavers

195 search results - page 25 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
BPM
2006
Springer
149views Business» more  BPM 2006»
14 years 11 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
WETICE
2008
IEEE
15 years 3 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick
81
Voted
CCS
2006
ACM
15 years 1 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
75
Voted
MOBILWARE
2009
ACM
15 years 4 months ago
Middleware Solutions for Self-organizing Multi-hop Multi-path Internet Connectivity Based on Bluetooth
The availability of heterogeneous wireless interfaces and of growing computing resources on widespread portable devices pushes for enabling innovative deployment scenarios where mo...
Paolo Bellavista, Carlo Giannelli
91
Voted
CCS
2008
ACM
14 years 11 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...